Results 261 to 270 of about 10,750 (298)
Some of the next articles are maybe not open access.
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications, 2011How to establish secure session keys is one of the central tasks for wireless sensor network communications. General key distribution schemes for traditional computer networks could not be directly shifted to wireless sensor network environments as broadcast messages may be lost due to sensor network internal factors or external attacks.
Tian, Biming +3 more
openaire +2 more sources
A Novel Key Distribution Algorithm in Wireless Sensor Network
2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, 2014This paper studies the E-G key pre-distribution algorithm principle, and a new key distribution algorithm based on the Blom key pre-distribution model is proposed. The nodes is deployed in a hexagonal area. Each cluster uses preshared key to establish key pair, Blom key pre-distribution model is used in the establishment of key pair among clusters. The
openaire +1 more source
Secure Secret Key Distribution and Storage in Wireless Sensor Networks
2010 10th IEEE International Conference on Computer and Information Technology, 2010Security in Wireless Sensor Networks (WSNs) is commonly bootstrapped by cryptographic key distribution among nodes. In this scenario, one of the greatest research challenges is to ensure secure keys storage by sensors due to their constrained resources and major exposure to tampering attempts.
Juliano F. Kazienko +1 more
openaire +1 more source
A Novel Key Pre-distribution Scheme in Wireless Sensor Networks
2014 Tenth International Conference on Computational Intelligence and Security, 2014Key management for wireless sensor networks has been a challenging research topic since stringent resource constraints make the key pre-distribution schemes difficult to implement. This paper proposes a novel key pre-distribution method based on trivariate symmetry polynomial and hash function.
Zhongyuan Qin +3 more
openaire +1 more source
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
2006 IEEE International Conference on Communications, 2006Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations.
Camtepe, Seyit +2 more
openaire +2 more sources
A Combinatorial Approach for Key-Distribution in Wireless Sensor Networks
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, 2008Sensor nodes are usually deployed in adversarial environments in which they are subject to compromise and revelation of critical information rendering the entire network useless. Therefore, secure communication of wireless sensor networks (WSNs) necessitates utilization of efficient key distribution schemes. Over the past few years, several works using
H. Shafiei +3 more
openaire +1 more source
Key pre-distribution in wireless sensor networks using multivariate polynomials
2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005., 2005Key agreement in sensor networks is a dif- ficult problem because of resource constraints of the sensors. The classical approaches used in general networks are impractical in sensor networks. Hence, several key pre-distribution schemes are proposed. In this paper, we propose a hypercube multivariate scheme (HMS) that is a threshold-based scheme. In the
F. Delgosha, F. Fekri
openaire +1 more source
An improved distributed key revocation scheme in wireless sensor networks
2008 11th IEEE International Conference on Communication Technology, 2008A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment ...
null Jun Zhou, null Mingxing He
openaire +1 more source
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications, 2011Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network ...
Kevin Henry, Douglas R. Stinson
openaire +1 more source
An Improved Distributed Key Management Scheme in Wireless Sensor Networks
2009A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users' joining and revocation operations by using secret sharing techniques and Modified Blom's symmetric key establishment mechanism.
Jun Zhou, Mingxing He
openaire +1 more source

